Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe
-
Size
4.0MB
-
MD5
5ca4b78f414036b4bf34bc8de3947318
-
SHA1
6f3b3802691384a3c1bfa55489ca03f5541e8683
-
SHA256
e0b17abe31aeccd2ecd31c1ff7d2276f0a27b2b04d060e7555a3c0589ff08be4
-
SHA512
e84a9ffd5901d55b457b2d6dd03ad1bc829cdd3fb3e67b26238d94e7b4c99636f7e399d56de2f87ab970d9ef39df5a0b10af0eea4d39b0b7a811cb0f1b838e66
-
SSDEEP
98304:o/nqPXevmgbSwFDWwuJvTx/qzaRQVbEZTubdS2NdQqVh:o/qXXwFDTuJvT0m+bEtubQ
Malware Config
Extracted
darkcomet
Renner
tutoriais157.no-ip.org:1604
DC_MUTEX-XXCP2CL
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
i2mVQTZrqSxh
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Executes dropped EXE 5 IoCs
Processes:
VIP TRI-HACK.EXEVIP TRI-HACK.EXEmsdcsc.exeVIP TRI-HACK.EXEmsdcsc.exepid Process 2772 VIP TRI-HACK.EXE 2840 VIP TRI-HACK.EXE 1892 msdcsc.exe 2564 VIP TRI-HACK.EXE 972 msdcsc.exe -
Loads dropped DLL 7 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exeVIP TRI-HACK.EXEVIP TRI-HACK.EXEVIP TRI-HACK.EXEpid Process 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 2772 VIP TRI-HACK.EXE 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 2840 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exemsdcsc.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Drops file in System32 directory 4 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exemsdcsc.exedescription ioc Process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exemsdcsc.exedescription pid Process procid_target PID 2380 set thread context of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 1892 set thread context of 972 1892 msdcsc.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
VIP TRI-HACK.EXEmsdcsc.exenotepad.exe5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exeVIP TRI-HACK.EXEmsdcsc.exeVIP TRI-HACK.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIP TRI-HACK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIP TRI-HACK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIP TRI-HACK.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
VIP TRI-HACK.EXEpid Process 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE 2564 VIP TRI-HACK.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
VIP TRI-HACK.EXEpid Process 2564 VIP TRI-HACK.EXE -
Suspicious use of AdjustPrivilegeToken 59 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exeVIP TRI-HACK.EXEmsdcsc.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeSecurityPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeSystemtimePrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeBackupPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeRestorePrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeShutdownPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeDebugPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeUndockPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeManageVolumePrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeImpersonatePrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: 33 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: 34 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: 35 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe Token: SeDebugPrivilege 2564 VIP TRI-HACK.EXE Token: SeLoadDriverPrivilege 2564 VIP TRI-HACK.EXE Token: SeCreateGlobalPrivilege 2564 VIP TRI-HACK.EXE Token: 33 2564 VIP TRI-HACK.EXE Token: SeSecurityPrivilege 2564 VIP TRI-HACK.EXE Token: SeTakeOwnershipPrivilege 2564 VIP TRI-HACK.EXE Token: SeManageVolumePrivilege 2564 VIP TRI-HACK.EXE Token: SeBackupPrivilege 2564 VIP TRI-HACK.EXE Token: SeCreatePagefilePrivilege 2564 VIP TRI-HACK.EXE Token: SeShutdownPrivilege 2564 VIP TRI-HACK.EXE Token: SeRestorePrivilege 2564 VIP TRI-HACK.EXE Token: 33 2564 VIP TRI-HACK.EXE Token: SeIncBasePriorityPrivilege 2564 VIP TRI-HACK.EXE Token: SeIncreaseQuotaPrivilege 972 msdcsc.exe Token: SeSecurityPrivilege 972 msdcsc.exe Token: SeTakeOwnershipPrivilege 972 msdcsc.exe Token: SeLoadDriverPrivilege 972 msdcsc.exe Token: SeSystemProfilePrivilege 972 msdcsc.exe Token: SeSystemtimePrivilege 972 msdcsc.exe Token: SeProfSingleProcessPrivilege 972 msdcsc.exe Token: SeIncBasePriorityPrivilege 972 msdcsc.exe Token: SeCreatePagefilePrivilege 972 msdcsc.exe Token: SeBackupPrivilege 972 msdcsc.exe Token: SeRestorePrivilege 972 msdcsc.exe Token: SeShutdownPrivilege 972 msdcsc.exe Token: SeDebugPrivilege 972 msdcsc.exe Token: SeSystemEnvironmentPrivilege 972 msdcsc.exe Token: SeChangeNotifyPrivilege 972 msdcsc.exe Token: SeRemoteShutdownPrivilege 972 msdcsc.exe Token: SeUndockPrivilege 972 msdcsc.exe Token: SeManageVolumePrivilege 972 msdcsc.exe Token: SeImpersonatePrivilege 972 msdcsc.exe Token: SeCreateGlobalPrivilege 972 msdcsc.exe Token: 33 972 msdcsc.exe Token: 34 972 msdcsc.exe Token: 35 972 msdcsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
VIP TRI-HACK.EXEpid Process 2564 VIP TRI-HACK.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exemsdcsc.exemsdcsc.exepid Process 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 1892 msdcsc.exe 972 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exeVIP TRI-HACK.EXEVIP TRI-HACK.EXEmsdcsc.exemsdcsc.exedescription pid Process procid_target PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2224 2380 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2772 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2772 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2772 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2772 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2840 2772 VIP TRI-HACK.EXE 32 PID 2772 wrote to memory of 2840 2772 VIP TRI-HACK.EXE 32 PID 2772 wrote to memory of 2840 2772 VIP TRI-HACK.EXE 32 PID 2772 wrote to memory of 2840 2772 VIP TRI-HACK.EXE 32 PID 2224 wrote to memory of 1892 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 33 PID 2224 wrote to memory of 1892 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 33 PID 2224 wrote to memory of 1892 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 33 PID 2224 wrote to memory of 1892 2224 5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe 33 PID 2840 wrote to memory of 2564 2840 VIP TRI-HACK.EXE 34 PID 2840 wrote to memory of 2564 2840 VIP TRI-HACK.EXE 34 PID 2840 wrote to memory of 2564 2840 VIP TRI-HACK.EXE 34 PID 2840 wrote to memory of 2564 2840 VIP TRI-HACK.EXE 34 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 1892 wrote to memory of 972 1892 msdcsc.exe 36 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37 PID 972 wrote to memory of 1192 972 msdcsc.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ca4b78f414036b4bf34bc8de3947318_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\VIP TRI-HACK.EXE"C:\Users\Admin\AppData\Local\Temp\VIP TRI-HACK.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\VIP TRI-HACK.EXE"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\VIP TRI-HACK.EXE" -ORIGIN:"C:\Users\Admin\AppData\Local\Temp\"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\VIP TRI-HACK.EXE"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\VIP TRI-HACK.EXE" "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET2EFC.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Users\Admin\AppData\Local\Temp\"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2564
-
-
-
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD58e3605193c41f185077b184d0ae8de37
SHA19f60c847d710bea0a1635cdc1e52640008ff0594
SHA256967029fbce5238d8563591e8308afa7f2c56c024cc010a0f662ceb0f112323b7
SHA512954c95f074f767ae7662e3165a55fdffaac443176db73624a8cf8bf7bd87d1d1e1d1569f9e698a8bdca0fae6716767bf78a1f90beae46a4404a99d4202ef9897
-
Filesize
15KB
MD59c973b4036c540f238a0d3f5faa09878
SHA1a48dae90053866c0acf8555e6c6c10de8099e34b
SHA256027cc11720d6ada16cfa9398773054650c670dc3f6ecf10aee3fe47c7e055e86
SHA512d5ac8b2430448cda16e6e5ed151371cf08e18b8e05d5a38be2581cb0ed6a60bf2b9eae710f200e4d62a2d397327a518a9e2961be518e691890b96aaf4ea90cc9
-
Filesize
3KB
MD51c08aaed49c4c67bd2bb3a235c720348
SHA1ed1dad9db0270c072e5609c8a0b676f46ecc7f3e
SHA256fb36305086e4458907a73ec270523db872d58e8772f2fa58271936f6bb727440
SHA51247325bf6c272047b6daa6b0555236da14ff8d52a9e3e3a5f7398a1aea175de99ee42ca5c4e34da5601e58fb0e752fba772575a7e839f207c569f64a106a78e95
-
Filesize
1.2MB
MD54003e34416ebd25e4c115d49dc15e1a7
SHA1faf95ec65cde5bd833ce610bb8523363310ec4ad
SHA256c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f
SHA51288f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84
-
Filesize
3.3MB
MD5bf0b08da36e54274d2e622204dde8a0d
SHA1ba746792dc4355ee5de3a9b8b6a43b0e3d9c7d79
SHA256c18eb190e5cc01bab2f066ba1dace4db5ca8034126c71a8936cf86d081d66cfa
SHA51231f674b30e712e7a6ef82caef9a1f9431711379cc45ef8c654cdcb7a892f71fdf6d1c4257c4e318350a7a7505a11e6ca7bbae097b672f27182d4628b11caf8d6
-
Filesize
188KB
MD500bb109abc3e80495c919241198352e6
SHA14b50b54af591836571fece5326b59456cd8264ad
SHA25641f456c9bdbe7df6df63629d4bcee63ebff386d473a3cd9c2ef38bcd8e053171
SHA5127fa4acfa825232cc72cb3bdbac01c0af2e61641ff62233403ed95511c436418f802aab897ae961e8a15ef460ff8b694e4996c8ab29f4552a3babb3a4995adeaf
-
Filesize
6.4MB
MD589637453e3bf64e87334ee83b0fc3ee8
SHA16115eace9959ff8d67aec6412ac6adf19b15e213
SHA256ee2fcbdf1a0b5ea1d04fc34dd0f51175b6954c721039ee60a125e961767e3201
SHA5121ff1603b68c1ec26294b4d7d730ed43b1c4d82b7799be9db399a8aae9f62e089c44de0e51d2be2192191c3bec981b83a98a85dfb0f554b0521efb9ec5abf866c
-
Filesize
322KB
MD503c7c30bdad17e233843f61d46f22542
SHA1aec92289caa4b1f085e37c9945fdc25882b338bf
SHA2566720db08ff6ed24f9e6c3f2912fff2512a6904bdf68b946f85ae97a643630d41
SHA512005e3421adf98dd4eec9a6ea4ed7ef11a3b1372d466d7ab7fa87ebcb37202c5ac223d42c367516ea505dd919afcdde160b9c4d09ad16334238680615e06b2052
-
Filesize
4.0MB
MD55ca4b78f414036b4bf34bc8de3947318
SHA16f3b3802691384a3c1bfa55489ca03f5541e8683
SHA256e0b17abe31aeccd2ecd31c1ff7d2276f0a27b2b04d060e7555a3c0589ff08be4
SHA512e84a9ffd5901d55b457b2d6dd03ad1bc829cdd3fb3e67b26238d94e7b4c99636f7e399d56de2f87ab970d9ef39df5a0b10af0eea4d39b0b7a811cb0f1b838e66